Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading

Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading

Posted on May 11, 2026 By CWS

Cybercriminals have devised a new tactic to entice victims into downloading harmful software, using a counterfeit version of Anthropic’s Claude AI assistant to execute their campaign. This operation raises alarms due to its sophisticated use of a PlugX-like DLL sideloading chain.

The Fake Claude Website

Attackers created a deceptive website, claude-pro[.]com, that closely resembles the authentic Claude AI site, employing similar fonts and color schemes. Visitors are lured into downloading a file labeled ‘Claude-Pro Relay,’ which is actually a large ZIP archive containing a Windows installer. Once executed, this installer surreptitiously places three malicious files in the system’s startup folder, ensuring their automatic execution upon system boot.

Sophos X-Ops researchers discovered the campaign while investigating the site’s role in malware distribution. Initially appearing as a typical PlugX operation, further analysis revealed an undocumented backdoor named ‘Beagle’ and a loader called DonutLoader, marking it as a novel threat.

Malvertising and SEO Poisoning

The campaign gains traction through malvertising, with attackers purchasing ad space to display harmful links in search results. Users searching for the Claude AI tool might inadvertently access the fake site. Additionally, SEO poisoning likely enhances the site’s visibility, drawing even more unsuspecting visitors.

Notably, the campaign mixes established attack strategies with a newly crafted payload. The reuse of an XOR key across different samples from early 2026 indicates an ongoing, coordinated effort rather than a singular incident. This evolving threat has been developing over several months, suggesting a sustained campaign.

Technical Exploits and the Beagle Backdoor

The malware installation begins when users run the Claude.msi installer, which deposits three files: NOVupdate.exe, NOVupdate.exe.dat, and avk.dll. A legitimate G DATA antivirus updater, NOVupdate.exe, is manipulated to load a malicious avk.dll through DLL sideloading, a hallmark of PlugX campaigns.

This rogue DLL decrypts a payload hidden within NOVupdate.exe.dat using a hardcoded XOR key, executing it entirely in memory. This method evades traditional security detections. The decrypted payload is DonutLoader shellcode, linked to advanced attacks on governmental systems.

Upon execution, DonutLoader delivers the Beagle backdoor, which connects to a command-and-control server at license[.]claude-pro[.]com. Utilizing a hardcoded AES key, it encrypts all traffic, allowing attackers to manage files, execute commands, and maintain system access through TCP and UDP ports.

Protection Measures and Outlook

To mitigate risk, users are advised to download Claude AI exclusively from the official Anthropic website and avoid sponsored search links. Checking the startup folder for suspicious files like NOVupdate.exe and monitoring connections to claude-pro[.]com can help identify infections.

Sophos researchers also identified related samples dating back to February 2026, suggesting the infrastructure might support various campaigns or actors. Vigilance in cybersecurity practices remains crucial as this threat continues to evolve.

Cyber Security News Tags:Backdoor, Beagle backdoor, C2 Server, Claude AI, Cybersecurity, DLL Sideloading, DonutLoader, Encryption, Malvertising, Malware, PlugX, Sophos

Post navigation

Previous Post: Critical cPanel Vulnerability Exploited by Cybercriminals
Next Post: Checkmarx Jenkins Plugin Compromised by TeamPCP

Related Posts

Critical HPE Telco Service Activator Security Flaw Exposed Critical HPE Telco Service Activator Security Flaw Exposed Cyber Security News
ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates Cyber Security News
BlindEagle Hackers Attacking Government Agencies with Powershell Scripts BlindEagle Hackers Attacking Government Agencies with Powershell Scripts Cyber Security News
AI Vulnerability Exposed Through Custom Font Attacks AI Vulnerability Exposed Through Custom Font Attacks Cyber Security News
NAKIVO v11.2 Enhances Replication and vSphere Support NAKIVO v11.2 Enhances Replication and vSphere Support Cyber Security News
Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark